Glenn πŸ“Ž

Experienced InfoSec | Elder Millennial | πŸ’Ό Security Research @greynoise | I ask 'why?' a lot | Pro Oxford Comma | Fix it! | He/Him | #BLM | Views are my own.

2025-06-24

How is @hrbrmstr following me!

Troll!
2025-06-19

@dpendolino

Wordle 1,460 3/6*

β¬›β¬›β¬›β¬›πŸŸ¨
πŸŸ¨πŸŸ¨πŸŸ¨πŸŸ¨β¬›
🟩🟩🟩🟩🟩

2025-06-19

Heyyyyyyyooooo will I see you there? infosec.exchange/@greynoise/11

2025-06-16

@hrbrmstr brb, I'll get an abacus and Haskell going...

2025-06-14

Err on the side of caution today. Someone handed me a bottle of water (because it’s >100Β°) and the seal wasn’t sealed completely. Likely fine but not going to find out.

2025-06-14

Double check everything #AI :)

2025-06-12

Just a totally normal trip home from the airport last night… passing the national guard rolling down the highway as they prepare for NO KINGS DAY protests. F this administration. About 3 more months before they start trying to censor social media via tech controls.

2025-06-09

@hrbrmstr wait wait WAIT then how are you ALSO here??

2025-06-08

@heymarkreeves I verified before sharing. πŸ‘

2025-06-08
2025-06-08

@hrbrmstr busted

Glenn πŸ“Ž boosted:
boB Rudis πŸ‡ΊπŸ‡¦ πŸ‡¬πŸ‡± πŸ‡¨πŸ‡¦hrbrmstr
2025-06-05

🚨 This is some VERY IMPORTANT INFO to read about malicious MCP servers by the VirusTotal team @ Google.

blog.virustotal.com/2025/06/wh

table titled "ATTACK VECTOR" & "EXAMPLE INDICATORS" that outlines various Model Context Poisoning (MCP) attack methods and their warning signs.
The attack vectors listed include:
Malicious-Server Supply Chain - Self-update scripts, install hooks from non-canonical URLs, latest tag pulls.
Rogue Server / Impersonation - Hard-coded IPs or typo-squatted domains, no TLS/mTLS verification.
Credential Harvesting - Code that reads ~/.aws, Keychain, or env vars and posts to external endpoint.
Tool-Based RCE & File Ops - subprocess, exec, or rm -rf paths built from LLM/user input.
Server-Side Command Injection - Server concatenates JSON-RPC params into shell/SQL without escaping.
Semantic-Gap Poisoning - Manifest says "read-only"; implementation writes files or opens sockets.
Over-broad Permissions - OAuth scopes */ "full_access", multiple data silos bridged in one tool.
Indirect Prompt Injection - HTML comments, zero-width chars, or Base64 blobs returned to the host.
Context/Data Poisoning - Unvalidated web-scrape fed straight into context= parameter.
Sampling-Feature Abuse - Server requests giant completions before any other call; leaks system prompt.
Living-Off-The-Land - Malicious server does nothing but orchestrate trusted tools already installed.
Chained MCP Exploitation - Output from Server A becomes params for Server B within one loop.
Financial-Fraud Tools / DoS / Persistence - Payment APIs with LLM-supplied dest-IDs, infinite loops without rate limits, hot-swapped binaries.
2025-05-29

Seems like a lot of work when you could have found 200 year old brain proteins in the US Congress rn.

phys.org/news/2025-05-paleopro

2025-05-29

@dpendolino

Wordle 1,439 4/6*

πŸŸ©πŸŸ¨πŸŸ¨β¬›β¬›
πŸŸ©πŸŸ¨β¬›πŸŸ¨β¬›
🟩🟨🟨🟩🟨
🟩🟩🟩🟩🟩

2025-05-28

It's hard to beat good deception. :) infosec.exchange/@greynoise/11

Glenn πŸ“Ž boosted:
2025-05-28

We are back this Thursday for another GreyNoise University LIVE, tune in for demos, news + what to expect this month! πŸ”—greynoise.io/events/greynoise-

2025-05-28

How do you officially request a pickleball emoji? I bet @hrbrmstr would know.

2025-05-27

If you're ever feeling lonely, just close Zoom.
This works because a funny thing always happens: a random last-minute Zoom will appear if you close it completely.

2025-05-25

@dpendolino

Wordle 1,436 6/6*

β¬›β¬›πŸŸ©β¬›β¬›
β¬›β¬›πŸŸ©β¬›β¬›
β¬›πŸŸ¨πŸŸ©πŸŸ¨β¬›
πŸŸ¨πŸŸ©πŸŸ©β¬›β¬›
β¬›πŸŸ©πŸŸ©πŸŸ¨β¬›
🟩🟩🟩🟩🟩

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst